Armor Complete

Secure cloud hosting. Managed security. Audit-ready compliance.

Embrace the cloud with Armor Complete

Yes, cybersecurity is complex. Yes, compliance is also complex. Yes, there is a solution that makes managing both feel simple. Yes, it is Armor Complete.

Armor Complete is our secure hosting solution. It is a virtual private cloud (VPC) with built-in security controls that provides the industry’s leading prevention, detection, and response services—keeping your sensitive, regulated data safe and secure. Armor Complete is cybersecurity that goes beyond alerting—beyond compliance—blocking 99.999% of all malicious security events; holding a 4% false positive rate in an industry that considers 30-40% exceptional; and reducing threat actors’ dwell time from days (industry average) to minutes.

How do we do it? It’s a combination of things, including people, passion, creativity, tools, technology, smarts, humor, caffeine, and experience—among others. We tested software, hardware, solutions, tools, people, processes—all the things there are to test when building an environment so secure that regulatory compliance was an outcome, not a goal. We did all that so our clients wouldn’t have to—that’s how we make cloud security simple.

With nearly a decade of hosting compliance-driven applications, we have built an audit-friendly reputation that simplifies compliance.

Components of everything from the datacenter to the application layer are protected by Armor’s uncompromised security approach. Leveraging Armor’s experience enables your business to achieve the highest level of compliance more easily, for less cost and with less management overhead than doing it yourself.

FIM is designed to monitor critical system file locations and alert you when your files have changed. It also monitors critical operating system (OS) files for changes that may allow threat actors to control your environment. FIM uses OS-specific policies and provides Armor with log visibility to assist in reviewing security events.

With visibility to inbound and outbound activity at the host, Armor inspects anomalous traffic against predefined policies—detecting attacks like generic SQL injections, generic XSS attacks, DoS, and generic web app attacks. This service provides an agent-based IDS on the installed host for network traffic analysis and reporting based around policies defined by Armor.

Log management captures and documents, analyzes and reports on log events from firewalls, servers, OS logs, and other applications to determine their validity and severity. Customers can view 30 days of logs in the Armor management portal (AMP) and store up to 13 months of log events consistent with applicable regulatory requirements.

PATCH MONITORING

Patch monitoring provides visibility into your environment to identify critical OS-level patches for resolution. Armor provides visibility into your environment running the Armor Complete agent, so you can ensure your OS is consistently up to date.

THREAT HUNTING

Proactive threat hunting within our data lake identifies threat actor activity not alerted to by our security incident and event management (SIEM) leveraging the research and expertise of the Threat Resistance Unit (TRU), as well as threat intelligence derived from a variety of sources.

VULNERABILITY SCANNING

Armor scans for potential points of risk to help reduce the surface area of attack. Weekly scheduled scans provide you a visible audit report to identify the vulnerabilities that attackers could use to penetrate your network, so you can develop your remediation plan.

Thank you!

24/7/365 Customer Support & Solutions

Armor Complete customers have all the access—from hosting management to insightful security discussions and effective incident response (IR)—we start at onboarding and just don’t stop, ever:

Access to consultative and certified engineers

Compliance specialists on staff

Accredited SOC

Incident monitoring and proactive response

Security policies, reporting, and monitoring

Network and information security

Flexible support channels: ticket, phone, and chat

Client portal with self-service hosting, security management, and support ticketing

Managed operating systems, hardened to the highest standards

SSL VPN access with two-factor authentication

Backup and recovery

ARMOR COMPLETE: EMPOWERING CLOUD PERFORMANCE

NATIVE PERFORMANCE CAPABILITIES FOR AN AGILE, SCALABLE, AND DEVOPS-READY CLOUD

Armor Complete is managed for performance. We don’t oversubscribe; we over-deliver network, compute, and storage performance. It’s simple math: fewer clients sharing the same resources result in higher performance for each client.

HOW DO YOU COMPARE CLOUD POWER?

Cloud oversubscription is the ratio of virtual server resources to physical server (host) resources. For example, a physical host (the bare metal host) equipped with two processor sockets of 12 cores each has a capacity of 24 physical CPUs (or pCPUs). However, your cloud provider may provision as many virtual CPUs (vCPUs) on that host as they wish. This performance variability stems from the fact that different cloud providers operate at different levels of oversubscription—further complicating the process of comparing clouds.

Operating Systems We Support

VIRTUAL PRIVATE CLOUD

WE DON’T BUILD YOU A SERVER, WE BUILD YOU A FORTRESS

ARMOR COMPLETE – HOW IT WORKS Armor Complete is built on the powerful and proven VMWare NSX platform, the network virtualization and security platform for the Software-Defined Data Center (SDDC). Every Armor Complete customer receives their own virtual private cloud; within that environment, IP addresses are private, as part of our zero-trust architecture. The operating system running your cloud servers is hardened following industry and proprietary best practices.

Security Agent

SHARED RESPONSIBILITY

ACHEIVE UNCOMPROMISED SECURITY, TOGETHER

Armor allows you to outsource your risk by sharing the responsibility. Armor complete is purpose-built to achieve a secure and compliant posture for your data that enables your business to innovate in the cloud. Armor reduces the burden of these challenges for your organization by sharing both risk and responsibility.

Armor Complete Shared Responsibility

Security and compliance is a shared responsibility between Armor and our customer.

Amy Bakameyer

Armor Management Portal

The Armor Management Portal (AMP) provides you with a single-pane-of-glass visibility into your security program providing real-time visibility and management of your security controls.

Security Metrics to Benchmark Your Success Integrated within AMP, the Security Analytics dashboard delivers real-time visibility powered by advanced correlation and analytics to help you make smarter decisions.

Instantly add and scale cloud resources such as virtual servers and storage

Make instant firewall policy changes with self-service rules

Manage their IP space (public and private)

Create and manage site-to-site (L2L) VPN tunnels

Control access to the environment by managing users, roles and permissions

Create and interact with support tickets

Shop for additional services such as additional IP addresses, data replication, backups, encryption and many others in theArmor Marketplace

Real-time visibility into security metrics through the Security Dashboard

WHAT MAKES ARMOR SOLUTIONS SO COMPLETE, EASY AND EFFECTIVE AGAINST TODAY'S CYBER THREAT?

The Armor Spartan threat prevention and response platform is how Armor delivers security outcomes for our customers. The Armor Spartan platform is purpose-built to leverage the agility and speed of the cloud, scaling up to drive new community insights against an ever-changing threat landscape as well as scaling out to provide unified visibility across an ever-changing IT landscape.

Amy Bakameyer

OpenKey: Leading the Way with Secure Mobile Keyless Hotel Access

Learn more about how essential cybersecurity has become to OpenKey, a company leading the way with secure mobile keyless hotel access, and why they chose Armor Complete for their secure hosting needs as they grow internationally, in one of the top five industries subjected to network breaches every year.

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Every role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected.